Rotating passwords and keys

IAM users are supplied with a password and a pair of keys called Access Keys and Secret Access Keys. The IAM user needs to supply both of them together to be authenticated. It is recommended that these keys and credentials are rotated frequently so that any compromised credential becomes ineffective after that time frame.

Get Hands-On Serverless Applications with Kotlin now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.